Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(286)

Side by Side Diff: Source/bindings/modules/v8/ScriptValueSerializerForModules.cpp

Issue 718383003: bindings: fixed incorrect dependency of SerializedScriptValue. (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "config.h"
6 #include "bindings/modules/v8/ScriptValueSerializerForModules.h"
7
8 #include "bindings/core/v8/SerializationTag.h"
9 #include "bindings/core/v8/V8Binding.h"
10 #include "bindings/modules/v8/V8CryptoKey.h"
11 #include "bindings/modules/v8/V8DOMFileSystem.h"
12 #include "modules/filesystem/DOMFileSystem.h"
13 #include "public/platform/Platform.h"
14
15 namespace blink {
16
17 enum CryptoKeyAlgorithmTag {
18 AesCbcTag = 1,
19 HmacTag = 2,
20 RsaSsaPkcs1v1_5Tag = 3,
21 // ID 4 was used by RsaEs, while still behind experimental flag.
22 Sha1Tag = 5,
23 Sha256Tag = 6,
24 Sha384Tag = 7,
25 Sha512Tag = 8,
26 AesGcmTag = 9,
27 RsaOaepTag = 10,
28 AesCtrTag = 11,
29 AesKwTag = 12,
30 RsaPssTag = 13,
31 EcdsaTag = 14,
32 // Maximum allowed value is 2^32-1
33 };
34
35 enum NamedCurveTag {
36 P256Tag = 1,
37 P384Tag = 2,
38 P521Tag = 3,
39 };
40
41 enum CryptoKeyUsage {
42 // Extractability is not a "usage" in the WebCryptoKeyUsages sense, however
43 // it fits conveniently into this bitfield.
44 ExtractableUsage = 1 << 0,
45
46 EncryptUsage = 1 << 1,
47 DecryptUsage = 1 << 2,
48 SignUsage = 1 << 3,
49 VerifyUsage = 1 << 4,
50 DeriveKeyUsage = 1 << 5,
51 WrapKeyUsage = 1 << 6,
52 UnwrapKeyUsage = 1 << 7,
53 DeriveBitsUsage = 1 << 8,
54 // Maximum allowed value is 1 << 31
55 };
56
57 enum CryptoKeySubTag {
58 AesKeyTag = 1,
59 HmacKeyTag = 2,
60 // ID 3 was used by RsaKeyTag, while still behind experimental flag.
61 RsaHashedKeyTag = 4,
62 EcKeyTag = 5,
63 // Maximum allowed value is 255
64 };
65
66 enum AssymetricCryptoKeyType {
67 PublicKeyType = 1,
68 PrivateKeyType = 2,
69 // Maximum allowed value is 2^32-1
70 };
71
72
73 ScriptValueSerializerForModules::ScriptValueSerializerForModules(SerializedScrip tValueWriterForModules& writer, MessagePortArray* messagePorts, ArrayBufferArray * arrayBuffers, WebBlobInfoArray* blobInfo, BlobDataHandleMap& blobDataHandles, v8::TryCatch& tryCatch, ScriptState* scriptState)
74 : ScriptValueSerializer(writer, messagePorts, arrayBuffers, blobInfo, blobDa taHandles, tryCatch, scriptState)
75 {
76 }
77
78 ScriptValueSerializer::StateBase* ScriptValueSerializerForModules::writeDOMFileS ystem(v8::Handle<v8::Value> value, ScriptValueSerializer::StateBase* next)
79 {
80 DOMFileSystem* fs = V8DOMFileSystem::toImpl(value.As<v8::Object>());
81 if (!fs)
82 return 0;
83 if (!fs->clonable())
84 return handleError(DataCloneError, "A FileSystem object could not be clo ned.", next);
85
86 toSerializedScriptValueWriterForModules(writer()).writeDOMFileSystem(fs->typ e(), fs->name(), fs->rootURL().string());
87 return 0;
88 }
89
90 bool ScriptValueSerializerForModules::writeCryptoKey(v8::Handle<v8::Value> value )
91 {
92 CryptoKey* key = V8CryptoKey::toImpl(value.As<v8::Object>());
93 if (!key)
94 return false;
95 return toSerializedScriptValueWriterForModules(writer()).writeCryptoKey(key- >key());
96 }
97
98 void SerializedScriptValueWriterForModules::writeDOMFileSystem(int type, const S tring& name, const String& url)
99 {
100 append(DOMFileSystemTag);
101 doWriteUint32(type);
102 doWriteWebCoreString(name);
103 doWriteWebCoreString(url);
104 }
105
106 bool SerializedScriptValueWriterForModules::writeCryptoKey(const WebCryptoKey& k ey)
107 {
108 append(static_cast<uint8_t>(CryptoKeyTag));
109
110 switch (key.algorithm().paramsType()) {
111 case WebCryptoKeyAlgorithmParamsTypeAes:
112 doWriteAesKey(key);
113 break;
114 case WebCryptoKeyAlgorithmParamsTypeHmac:
115 doWriteHmacKey(key);
116 break;
117 case WebCryptoKeyAlgorithmParamsTypeRsaHashed:
118 doWriteRsaHashedKey(key);
119 break;
120 case WebCryptoKeyAlgorithmParamsTypeEc:
121 doWriteEcKey(key);
122 break;
123 case WebCryptoKeyAlgorithmParamsTypeNone:
124 ASSERT_NOT_REACHED();
125 return false;
126 }
127
128 doWriteKeyUsages(key.usages(), key.extractable());
129
130 WebVector<uint8_t> keyData;
131 if (!Platform::current()->crypto()->serializeKeyForClone(key, keyData))
132 return false;
133
134 doWriteUint32(keyData.size());
135 append(keyData.data(), keyData.size());
136 return true;
137 }
138
139 void SerializedScriptValueWriterForModules::doWriteHmacKey(const WebCryptoKey& k ey)
140 {
141 ASSERT(key.algorithm().paramsType() == WebCryptoKeyAlgorithmParamsTypeHmac);
142
143 append(static_cast<uint8_t>(HmacKeyTag));
144 ASSERT(!(key.algorithm().hmacParams()->lengthBits() % 8));
145 doWriteUint32(key.algorithm().hmacParams()->lengthBits() / 8);
146 doWriteAlgorithmId(key.algorithm().hmacParams()->hash().id());
147 }
148
149 void SerializedScriptValueWriterForModules::doWriteAesKey(const WebCryptoKey& ke y)
150 {
151 ASSERT(key.algorithm().paramsType() == WebCryptoKeyAlgorithmParamsTypeAes);
152
153 append(static_cast<uint8_t>(AesKeyTag));
154 doWriteAlgorithmId(key.algorithm().id());
155 // Converting the key length from bits to bytes is lossless and makes
156 // it fit in 1 byte.
157 ASSERT(!(key.algorithm().aesParams()->lengthBits() % 8));
158 doWriteUint32(key.algorithm().aesParams()->lengthBits() / 8);
159 }
160
161 void SerializedScriptValueWriterForModules::doWriteRsaHashedKey(const WebCryptoK ey& key)
162 {
163 ASSERT(key.algorithm().rsaHashedParams());
164 append(static_cast<uint8_t>(RsaHashedKeyTag));
165
166 doWriteAlgorithmId(key.algorithm().id());
167 doWriteAsymmetricKeyType(key.type());
168
169 const WebCryptoRsaHashedKeyAlgorithmParams* params = key.algorithm().rsaHash edParams();
170 doWriteUint32(params->modulusLengthBits());
171 doWriteUint32(params->publicExponent().size());
172 append(params->publicExponent().data(), params->publicExponent().size());
173 doWriteAlgorithmId(params->hash().id());
174 }
175
176 void SerializedScriptValueWriterForModules::doWriteEcKey(const WebCryptoKey& key )
177 {
178 ASSERT(key.algorithm().ecParams());
179 append(static_cast<uint8_t>(EcKeyTag));
180
181 doWriteAlgorithmId(key.algorithm().id());
182 doWriteAsymmetricKeyType(key.type());
183 doWriteNamedCurve(key.algorithm().ecParams()->namedCurve());
184 }
185
186 void SerializedScriptValueWriterForModules::doWriteAlgorithmId(WebCryptoAlgorith mId id)
187 {
188 switch (id) {
189 case WebCryptoAlgorithmIdAesCbc:
190 return doWriteUint32(AesCbcTag);
191 case WebCryptoAlgorithmIdHmac:
192 return doWriteUint32(HmacTag);
193 case WebCryptoAlgorithmIdRsaSsaPkcs1v1_5:
194 return doWriteUint32(RsaSsaPkcs1v1_5Tag);
195 case WebCryptoAlgorithmIdSha1:
196 return doWriteUint32(Sha1Tag);
197 case WebCryptoAlgorithmIdSha256:
198 return doWriteUint32(Sha256Tag);
199 case WebCryptoAlgorithmIdSha384:
200 return doWriteUint32(Sha384Tag);
201 case WebCryptoAlgorithmIdSha512:
202 return doWriteUint32(Sha512Tag);
203 case WebCryptoAlgorithmIdAesGcm:
204 return doWriteUint32(AesGcmTag);
205 case WebCryptoAlgorithmIdRsaOaep:
206 return doWriteUint32(RsaOaepTag);
207 case WebCryptoAlgorithmIdAesCtr:
208 return doWriteUint32(AesCtrTag);
209 case WebCryptoAlgorithmIdAesKw:
210 return doWriteUint32(AesKwTag);
211 case WebCryptoAlgorithmIdRsaPss:
212 return doWriteUint32(RsaPssTag);
213 case WebCryptoAlgorithmIdEcdsa:
214 return doWriteUint32(EcdsaTag);
215 }
216 ASSERT_NOT_REACHED();
217 }
218
219 void SerializedScriptValueWriterForModules::doWriteAsymmetricKeyType(WebCryptoKe yType keyType)
220 {
221 switch (keyType) {
222 case WebCryptoKeyTypePublic:
223 doWriteUint32(PublicKeyType);
224 break;
225 case WebCryptoKeyTypePrivate:
226 doWriteUint32(PrivateKeyType);
227 break;
228 case WebCryptoKeyTypeSecret:
229 ASSERT_NOT_REACHED();
230 }
231 }
232
233 void SerializedScriptValueWriterForModules::doWriteNamedCurve(WebCryptoNamedCurv e namedCurve)
234 {
235 switch (namedCurve) {
236 case WebCryptoNamedCurveP256:
237 return doWriteUint32(P256Tag);
238 case WebCryptoNamedCurveP384:
239 return doWriteUint32(P384Tag);
240 case WebCryptoNamedCurveP521:
241 return doWriteUint32(P521Tag);
242 }
243 ASSERT_NOT_REACHED();
244 }
245
246 void SerializedScriptValueWriterForModules::doWriteKeyUsages(const WebCryptoKeyU sageMask usages, bool extractable)
247 {
248 // Reminder to update this when adding new key usages.
249 COMPILE_ASSERT(EndOfWebCryptoKeyUsage == (1 << 7) + 1, UpdateMe);
250
251 uint32_t value = 0;
252
253 if (extractable)
254 value |= ExtractableUsage;
255
256 if (usages & WebCryptoKeyUsageEncrypt)
257 value |= EncryptUsage;
258 if (usages & WebCryptoKeyUsageDecrypt)
259 value |= DecryptUsage;
260 if (usages & WebCryptoKeyUsageSign)
261 value |= SignUsage;
262 if (usages & WebCryptoKeyUsageVerify)
263 value |= VerifyUsage;
264 if (usages & WebCryptoKeyUsageDeriveKey)
265 value |= DeriveKeyUsage;
266 if (usages & WebCryptoKeyUsageWrapKey)
267 value |= WrapKeyUsage;
268 if (usages & WebCryptoKeyUsageUnwrapKey)
269 value |= UnwrapKeyUsage;
270 if (usages & WebCryptoKeyUsageDeriveBits)
271 value |= DeriveBitsUsage;
272
273 doWriteUint32(value);
274 }
275
276 ScriptValueSerializer::StateBase* ScriptValueSerializerForModules::doSerialize(v 8::Handle<v8::Value> value, ScriptValueSerializer::StateBase* next)
277 {
278 if (V8DOMFileSystem::hasInstance(value, isolate())) {
279 toSerializedScriptValueWriterForModules(writer()).writeReferenceCount(ne xtObjectReference());
280 return writeDOMFileSystem(value, next);
281 }
282 if (V8CryptoKey::hasInstance(value, isolate())) {
283 toSerializedScriptValueWriterForModules(writer()).writeReferenceCount(ne xtObjectReference());
284 if (!writeCryptoKey(value))
285 return handleError(DataCloneError, "Couldn't serialize key data", ne xt);
286 return 0;
287 }
288 return ScriptValueSerializer::doSerialize(value, next);
289 }
290
291 bool SerializedScriptValueReaderForModules::read(v8::Handle<v8::Value>* value, S criptValueCompositeCreator& creator)
292 {
293 SerializationTag tag;
294 if (!readTag(&tag))
295 return false;
296 switch (tag) {
297 case DOMFileSystemTag:
298 if (!readDOMFileSystem(value))
299 return false;
300 creator.pushObjectReference(*value);
301 break;
302 case CryptoKeyTag:
303 if (!readCryptoKey(value))
304 return false;
305 creator.pushObjectReference(*value);
306 break;
307 default:
308 return SerializedScriptValueReader::readWithTag(tag, value, creator);
309 }
310 return !value->IsEmpty();
311 }
312
313 bool SerializedScriptValueReaderForModules::readDOMFileSystem(v8::Handle<v8::Val ue>* value)
314 {
315 uint32_t type;
316 String name;
317 String url;
318 if (!doReadUint32(&type))
319 return false;
320 if (!readWebCoreString(&name))
321 return false;
322 if (!readWebCoreString(&url))
323 return false;
324 DOMFileSystem* fs = DOMFileSystem::create(scriptState()->executionContext(), name, static_cast<FileSystemType>(type), KURL(ParsedURLString, url));
325 *value = toV8(fs, scriptState()->context()->Global(), isolate());
326 return true;
327 }
328
329 bool SerializedScriptValueReaderForModules::readCryptoKey(v8::Handle<v8::Value>* value)
330 {
331 uint32_t rawKeyType;
332 if (!doReadUint32(&rawKeyType))
333 return false;
334
335 WebCryptoKeyAlgorithm algorithm;
336 WebCryptoKeyType type = WebCryptoKeyTypeSecret;
337
338 switch (static_cast<CryptoKeySubTag>(rawKeyType)) {
339 case AesKeyTag:
340 if (!doReadAesKey(algorithm, type))
341 return false;
342 break;
343 case HmacKeyTag:
344 if (!doReadHmacKey(algorithm, type))
345 return false;
346 break;
347 case RsaHashedKeyTag:
348 if (!doReadRsaHashedKey(algorithm, type))
349 return false;
350 break;
351 case EcKeyTag:
352 if (!doReadEcKey(algorithm, type))
353 return false;
354 break;
355 default:
356 return false;
357 }
358
359 WebCryptoKeyUsageMask usages;
360 bool extractable;
361 if (!doReadKeyUsages(usages, extractable))
362 return false;
363
364 uint32_t keyDataLength;
365 if (!doReadUint32(&keyDataLength))
366 return false;
367
368 if (position() + keyDataLength > length())
369 return false;
370
371 const uint8_t* keyData = allocate(keyDataLength);
372 WebCryptoKey key = WebCryptoKey::createNull();
373 if (!Platform::current()->crypto()->deserializeKeyForClone(
374 algorithm, type, extractable, usages, keyData, keyDataLength, key)) {
375 return false;
376 }
377
378 *value = toV8(CryptoKey::create(key), scriptState()->context()->Global(), is olate());
379 return true;
380 }
381
382 bool SerializedScriptValueReaderForModules::doReadHmacKey(WebCryptoKeyAlgorithm& algorithm, WebCryptoKeyType& type)
383 {
384 uint32_t lengthBytes;
385 if (!doReadUint32(&lengthBytes))
386 return false;
387 WebCryptoAlgorithmId hash;
388 if (!doReadAlgorithmId(hash))
389 return false;
390 algorithm = WebCryptoKeyAlgorithm::createHmac(hash, lengthBytes * 8);
391 type = WebCryptoKeyTypeSecret;
392 return !algorithm.isNull();
393 }
394
395 bool SerializedScriptValueReaderForModules::doReadAesKey(WebCryptoKeyAlgorithm& algorithm, WebCryptoKeyType& type)
396 {
397 WebCryptoAlgorithmId id;
398 if (!doReadAlgorithmId(id))
399 return false;
400 uint32_t lengthBytes;
401 if (!doReadUint32(&lengthBytes))
402 return false;
403 algorithm = WebCryptoKeyAlgorithm::createAes(id, lengthBytes * 8);
404 type = WebCryptoKeyTypeSecret;
405 return !algorithm.isNull();
406 }
407
408 bool SerializedScriptValueReaderForModules::doReadRsaHashedKey(WebCryptoKeyAlgor ithm& algorithm, WebCryptoKeyType& type)
409 {
410 WebCryptoAlgorithmId id;
411 if (!doReadAlgorithmId(id))
412 return false;
413
414 if (!doReadAsymmetricKeyType(type))
415 return false;
416
417 uint32_t modulusLengthBits;
418 if (!doReadUint32(&modulusLengthBits))
419 return false;
420
421 uint32_t publicExponentSize;
422 if (!doReadUint32(&publicExponentSize))
423 return false;
424
425 if (position() + publicExponentSize > length())
426 return false;
427
428 const uint8_t* publicExponent = allocate(publicExponentSize);
429 WebCryptoAlgorithmId hash;
430 if (!doReadAlgorithmId(hash))
431 return false;
432 algorithm = WebCryptoKeyAlgorithm::createRsaHashed(id, modulusLengthBits, pu blicExponent, publicExponentSize, hash);
433
434 return !algorithm.isNull();
435 }
436
437 bool SerializedScriptValueReaderForModules::doReadEcKey(WebCryptoKeyAlgorithm& a lgorithm, WebCryptoKeyType& type)
438 {
439 WebCryptoAlgorithmId id;
440 if (!doReadAlgorithmId(id))
441 return false;
442
443 if (!doReadAsymmetricKeyType(type))
444 return false;
445
446 WebCryptoNamedCurve namedCurve;
447 if (!doReadNamedCurve(namedCurve))
448 return false;
449
450 algorithm = WebCryptoKeyAlgorithm::createEc(id, namedCurve);
451 return !algorithm.isNull();
452 }
453
454 bool SerializedScriptValueReaderForModules::doReadAlgorithmId(WebCryptoAlgorithm Id& id)
455 {
456 uint32_t rawId;
457 if (!doReadUint32(&rawId))
458 return false;
459
460 switch (static_cast<CryptoKeyAlgorithmTag>(rawId)) {
461 case AesCbcTag:
462 id = WebCryptoAlgorithmIdAesCbc;
463 return true;
464 case HmacTag:
465 id = WebCryptoAlgorithmIdHmac;
466 return true;
467 case RsaSsaPkcs1v1_5Tag:
468 id = WebCryptoAlgorithmIdRsaSsaPkcs1v1_5;
469 return true;
470 case Sha1Tag:
471 id = WebCryptoAlgorithmIdSha1;
472 return true;
473 case Sha256Tag:
474 id = WebCryptoAlgorithmIdSha256;
475 return true;
476 case Sha384Tag:
477 id = WebCryptoAlgorithmIdSha384;
478 return true;
479 case Sha512Tag:
480 id = WebCryptoAlgorithmIdSha512;
481 return true;
482 case AesGcmTag:
483 id = WebCryptoAlgorithmIdAesGcm;
484 return true;
485 case RsaOaepTag:
486 id = WebCryptoAlgorithmIdRsaOaep;
487 return true;
488 case AesCtrTag:
489 id = WebCryptoAlgorithmIdAesCtr;
490 return true;
491 case AesKwTag:
492 id = WebCryptoAlgorithmIdAesKw;
493 return true;
494 case RsaPssTag:
495 id = WebCryptoAlgorithmIdRsaPss;
496 return true;
497 case EcdsaTag:
498 id = WebCryptoAlgorithmIdEcdsa;
499 return true;
500 }
501
502 return false;
503 }
504
505 bool SerializedScriptValueReaderForModules::doReadAsymmetricKeyType(WebCryptoKey Type& type)
506 {
507 uint32_t rawType;
508 if (!doReadUint32(&rawType))
509 return false;
510
511 switch (static_cast<AssymetricCryptoKeyType>(rawType)) {
512 case PublicKeyType:
513 type = WebCryptoKeyTypePublic;
514 return true;
515 case PrivateKeyType:
516 type = WebCryptoKeyTypePrivate;
517 return true;
518 }
519
520 return false;
521 }
522
523 bool SerializedScriptValueReaderForModules::doReadNamedCurve(WebCryptoNamedCurve & namedCurve)
524 {
525 uint32_t rawName;
526 if (!doReadUint32(&rawName))
527 return false;
528
529 switch (static_cast<NamedCurveTag>(rawName)) {
530 case P256Tag:
531 namedCurve = WebCryptoNamedCurveP256;
532 return true;
533 case P384Tag:
534 namedCurve = WebCryptoNamedCurveP384;
535 return true;
536 case P521Tag:
537 namedCurve = WebCryptoNamedCurveP521;
538 return true;
539 }
540
541 return false;
542 }
543
544 bool SerializedScriptValueReaderForModules::doReadKeyUsages(WebCryptoKeyUsageMas k& usages, bool& extractable)
545 {
546 // Reminder to update this when adding new key usages.
547 COMPILE_ASSERT(EndOfWebCryptoKeyUsage == (1 << 7) + 1, UpdateMe);
548 const uint32_t allPossibleUsages = ExtractableUsage | EncryptUsage | Decrypt Usage | SignUsage | VerifyUsage | DeriveKeyUsage | WrapKeyUsage | UnwrapKeyUsage | DeriveBitsUsage;
549
550 uint32_t rawUsages;
551 if (!doReadUint32(&rawUsages))
552 return false;
553
554 // Make sure it doesn't contain an unrecognized usage value.
555 if (rawUsages & ~allPossibleUsages)
556 return false;
557
558 usages = 0;
559
560 extractable = rawUsages & ExtractableUsage;
561
562 if (rawUsages & EncryptUsage)
563 usages |= WebCryptoKeyUsageEncrypt;
564 if (rawUsages & DecryptUsage)
565 usages |= WebCryptoKeyUsageDecrypt;
566 if (rawUsages & SignUsage)
567 usages |= WebCryptoKeyUsageSign;
568 if (rawUsages & VerifyUsage)
569 usages |= WebCryptoKeyUsageVerify;
570 if (rawUsages & DeriveKeyUsage)
571 usages |= WebCryptoKeyUsageDeriveKey;
572 if (rawUsages & WrapKeyUsage)
573 usages |= WebCryptoKeyUsageWrapKey;
574 if (rawUsages & UnwrapKeyUsage)
575 usages |= WebCryptoKeyUsageUnwrapKey;
576 if (rawUsages & DeriveBitsUsage)
577 usages |= WebCryptoKeyUsageDeriveBits;
578
579 return true;
580 }
581
582 ScriptValueDeserializerForModules::ScriptValueDeserializerForModules(SerializedS criptValueReaderForModules& reader, MessagePortArray* messagePorts, ArrayBufferC ontentsArray* arrayBufferContents)
583 : ScriptValueDeserializer(reader, messagePorts, arrayBufferContents)
584 {
585 }
586
587 bool ScriptValueDeserializerForModules::read(v8::Local<v8::Value>* value)
588 {
589 return toSerializedScriptValueReaderForModules(reader()).read(value, *this);
590 }
591
592 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698